21.09.2015 Views

BATTLEFIELD OF THE FUTURE

Battlefield of the Future - Air University Press

Battlefield of the Future - Air University Press

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>BATTLEFIELD</strong> <strong>OF</strong> <strong>THE</strong> <strong>FUTURE</strong><br />

warfare between two belligerent nations . During the recent<br />

border dispute between Ecuador and Peru, Ecuador used the<br />

Internet to publish government bulletins and excerpts from<br />

local media to tell its side of the conflict . In retaliation, Peru<br />

Internet used a gopher site in an attempt to neutralize<br />

Ecuadorian propaganda . [A gopher is an information system<br />

residing on the Internet that knows where everything is and,<br />

through an arrangement of nested menus, allows a user to<br />

continue choosing menu items until the sought-after subject<br />

is located . 79] The resulting verbal skirmish left both nations<br />

working to set up their own gophers .8°<br />

Global information systems will enable ordinary users to<br />

access an extraordinary number of databases, far beyond the<br />

Internet capability of today (which is more than a million files at<br />

databases located at universities and corporate research<br />

centers) . New software technologies permit these accesses to be<br />

conducted autonomously, using "self-navigating data drones ."<br />

These drones, referred to as "knowbots," are released into the<br />

Internet and search for information on their own . They can roam<br />

from network to network, clone themselves, transmit data back<br />

to their origin, and communicate with other knowbots .8 l Given<br />

this capability, one has to wonder, and perhaps be concerned,<br />

about the potential for unauthorized, or at least undesirable,<br />

access to certain databases and computer activities .<br />

Hackers routinely attempt to get into US military systems .<br />

During the Gulf War, hackers from Denmark, Moscow, and Iraq<br />

tried to penetrate these systems .82 Our awareness of these<br />

attempts does not necessarily prove there were no successes of<br />

which we are unaware . And, even if they failed during that<br />

conflict, can we guarantee the security of our systems during the<br />

next war?<br />

These vulnerabilities were revealed recently when a British<br />

teenager using a personal computer at his home hacked his way<br />

into a US military computer network, gained access to files<br />

containing sensitive communications relating to the dispute<br />

with North Korea over international inspections of its nuclear<br />

program, and, after reading them, placed them on the Internet.<br />

His actions made those files available to about 35 million<br />

people . Officials suspect he had access to these computers for<br />

weeks, perhaps even months, before he was caught .<br />

192

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!